1. Lampson B, Abadi M, Burrows M, Wobber E: Authentication in distributed systems: theory and pratice. ACM Trans Comput Syst 1992, 10(4):265–310. 10.1145/138873.138874
2. Blaze M, Feigenbaum J, Strauss M: Compliance checking in the policymaker trust management system. In C ‘98: proceedings of the second international conference on financial cryptography. Lecture Notes in Computer Science. Springer, Berlin; 1998:254–274.
3. Li N, Mitchell JC: RT: a role-based trust-management framework. In The Third DARPA information survivability conference and exposition (DISCEX III). IEEE Computer Society Press, Washington, DC; 2003:201–212.
4. Becker MY, Fournet C, Gordon AD: SecPAL: design and semantics of a decentralized authorization language. J Comput Secur 2010, 18(4):619–665.
5. Foley SN, Zhou H: Authorisation subterfuge by delegation in decentralised networks. In International security protocols workshop. Lecture Notes in Computer Science. Springer, Berlin; 2005:97–102.